首页 > 最新文献

Annals of Telecommunications最新文献

英文 中文
CET-attention mechanism impact on the classification of EEG signals cet -注意机制对脑电信号分类的影响
IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-02-17 DOI: 10.1007/s12243-025-01071-7
Mouad Riyad, Abdellah Adib

The attention mechanism enables the processing of the data more efficiently by driving the neural networks to focus on the pertinent information. The increase in performance pushed their wide adoption, including for bio-signal. Multiple researchers explored their use of electroencephalography in many scenarios, including motor imagery. Despite the myriad of implementations, their achievement varies from one subject to another since the signals are delicate. In this paper, we extend our previous research (Riyad and Adib 2024) by suggesting a new implementation. The proposal employs the Convolutional Block Attention Module as a backbone with a few modifications adjusted for the nature of the electroencephalography. It uses three levels of attention that are performed on the channel, time, and electrode individually known as Channel Attention Module (CAM), Time Attention Module (TAM), and Electrode Attention Module (EAM). The compartmentalization authorizes the placing of the attention sub-block in diverse configurations, each with a specific order that impacts the extraction of the feature. Also, we suggest studying them with two structures, one with an early spatial filtering that uses the new block once and a late spatial filtering that uses the attention twice. For the experiments, we test on the dataset 2b of the BCI competition IV. The results show that placing the CAM first and feeding its output to the TAM and EAM boost the performance drastically. For optimal results, it is necessary to use the new attention once at the beginning of the network. Also, it permits an even classification of the classes compared with the others.

注意机制通过驱动神经网络将注意力集中在相关信息上,从而提高数据处理的效率。性能的提高推动了它们的广泛应用,包括生物信号。多名研究人员探索了脑电图在许多情况下的应用,包括运动意象。尽管有无数的实现,但它们的成就因主题而异,因为信号是微妙的。在本文中,我们通过提出一种新的实现来扩展我们之前的研究(Riyad和Adib 2024)。该建议采用卷积块注意模块作为主干,并根据脑电图的性质进行了一些修改。它使用三个级别的注意力,分别在通道、时间和电极上执行,分别称为通道注意力模块(CAM)、时间注意力模块(TAM)和电极注意力模块(EAM)。这种划分允许将注意力子块放置在不同的配置中,每个配置都有影响特征提取的特定顺序。此外,我们建议用两种结构来研究它们,一种是使用新块一次的早期空间滤波,另一种是使用两次注意力的后期空间滤波。对于实验,我们在BCI竞赛IV的数据集2b上进行了测试。结果表明,将CAM放在首位并将其输出馈送给TAM和EAM可以显着提高性能。为了获得最佳效果,有必要在网络开始时使用一次新的注意力。此外,与其他类相比,它允许对类进行均匀分类。
{"title":"CET-attention mechanism impact on the classification of EEG signals","authors":"Mouad Riyad,&nbsp;Abdellah Adib","doi":"10.1007/s12243-025-01071-7","DOIUrl":"10.1007/s12243-025-01071-7","url":null,"abstract":"<div><p>The attention mechanism enables the processing of the data more efficiently by driving the neural networks to focus on the pertinent information. The increase in performance pushed their wide adoption, including for bio-signal. Multiple researchers explored their use of electroencephalography in many scenarios, including motor imagery. Despite the myriad of implementations, their achievement varies from one subject to another since the signals are delicate. In this paper, we extend our previous research (Riyad and Adib 2024) by suggesting a new implementation. The proposal employs the Convolutional Block Attention Module as a backbone with a few modifications adjusted for the nature of the electroencephalography. It uses three levels of attention that are performed on the channel, time, and electrode individually known as Channel Attention Module (CAM), Time Attention Module (TAM), and Electrode Attention Module (EAM). The compartmentalization authorizes the placing of the attention sub-block in diverse configurations, each with a specific order that impacts the extraction of the feature. Also, we suggest studying them with two structures, one with an early spatial filtering that uses the new block once and a late spatial filtering that uses the attention twice. For the experiments, we test on the dataset 2b of the BCI competition IV. The results show that placing the CAM first and feeding its output to the TAM and EAM boost the performance drastically. For optimal results, it is necessary to use the new attention once at the beginning of the network. Also, it permits an even classification of the classes compared with the others.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 and networking","pages":"547 - 555"},"PeriodicalIF":2.2,"publicationDate":"2025-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145166579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance of cell-free massive MIMO with group SIC detectors and low-resolution ADCs over spatially correlated channels 空间相关信道上具有群SIC探测器和低分辨率adc的无小区大规模MIMO性能
IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-02-15 DOI: 10.1007/s12243-025-01070-8
Qian Li, Tianle Liu, Zhengquan Li, Jun Tong, Gaofeng Nie

This paper considers the performance of an uplink cell-free massive multiple-input multiple-output (mMIMO) system using low-resolution analog-to-digital converters (ADCs) under spatially correlated Rayleigh fading channels. Taking the advantage of the spectral efficiency (SE), we consider zero-forcing (ZF) group successive interference cancellation (GSIC) detectors to a cell-free mMIMO system and treat the system with ZF and ZF-SIC detectors as special cases. Using the additive quantization noise model (AQNM), we analyze the achievable SE under both perfect and imperfect channel state information (CSI) and compare these results with systems employing high-resolution ADCs. Then, we derive closed form expressions of SE for the cell-free mMIMO system. Numerical results verify the tightness of approximation expressions, and the SE of the system with GSIC detectors can be further improved with an increased number of groups. To investigate the potential of low-resolution ADC architectures, we also study the energy efficiency (EE) of the system. Our findings indicate that employing SIC detectors significantly enhances EE relative to systems utilizing linear ZF detectors. Besides, a similar EE of the system employing SIC detectors can be achieved by the system with GSIC detectors.

本文研究了在空间相关瑞利衰落信道下,采用低分辨率模数转换器(adc)的无上行单元大规模多输入多输出(mMIMO)系统的性能。利用光谱效率(SE)的优势,我们将零强迫(ZF)群连续干扰消除(GSIC)探测器考虑到无单元mMIMO系统中,并将带有ZF和ZF- sic探测器的系统作为特殊情况处理。利用加性量化噪声模型(AQNM)分析了在完全信道状态信息(CSI)和不完全信道状态信息(CSI)下可实现的SE,并将这些结果与采用高分辨率adc的系统进行了比较。然后,我们导出了无细胞mMIMO系统SE的封闭表达式。数值结果验证了近似表达式的严密性,并且随着组数的增加,GSIC检测器系统的SE可以进一步提高。为了研究低分辨率ADC架构的潜力,我们还研究了系统的能效(EE)。我们的研究结果表明,与使用线性ZF探测器的系统相比,使用SIC探测器显著提高了EE。此外,使用GSIC探测器的系统可以实现与使用SIC探测器的系统相似的EE。
{"title":"Performance of cell-free massive MIMO with group SIC detectors and low-resolution ADCs over spatially correlated channels","authors":"Qian Li,&nbsp;Tianle Liu,&nbsp;Zhengquan Li,&nbsp;Jun Tong,&nbsp;Gaofeng Nie","doi":"10.1007/s12243-025-01070-8","DOIUrl":"10.1007/s12243-025-01070-8","url":null,"abstract":"<div><p>This paper considers the performance of an uplink cell-free massive multiple-input multiple-output (mMIMO) system using low-resolution analog-to-digital converters (ADCs) under spatially correlated Rayleigh fading channels. Taking the advantage of the spectral efficiency (SE), we consider zero-forcing (ZF) group successive interference cancellation (GSIC) detectors to a cell-free mMIMO system and treat the system with ZF and ZF-SIC detectors as special cases. Using the additive quantization noise model (AQNM), we analyze the achievable SE under both perfect and imperfect channel state information (CSI) and compare these results with systems employing high-resolution ADCs. Then, we derive closed form expressions of SE for the cell-free mMIMO system. Numerical results verify the tightness of approximation expressions, and the SE of the system with GSIC detectors can be further improved with an increased number of groups. To investigate the potential of low-resolution ADC architectures, we also study the energy efficiency (EE) of the system. Our findings indicate that employing SIC detectors significantly enhances EE relative to systems utilizing linear ZF detectors. Besides, a similar EE of the system employing SIC detectors can be achieved by the system with GSIC detectors.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 7-8","pages":"687 - 698"},"PeriodicalIF":2.2,"publicationDate":"2025-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145165241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust physical layer security using frequency diverse array directional modulation 使用频变阵列定向调制的健壮物理层安全性
IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-02-14 DOI: 10.1007/s12243-025-01067-3
Mahdi Tayeb Masoud, Hossein Khaleghi Bizaki

The use of directional modulation is one of the prominent and practical solutions for ensuring physical layer security in modern telecommunications systems. In this method, the message signal is modulated by an array of antennas and transmitted in a specific direction toward the legitimate receiver, in such a way that the signal is degraded and not receivable correctly by eavesdroppers in other directions. By employing directional modulation based on a random frequency diverse array, secure communication can be achieved in two-dimensional space, including angle and distance, for the legitimate receiver. The secrecy performance of directional modulation based on a random frequency diverse array is considerably dependent on the information available to the transmitter side about the receiver’s location. In wireless cellular networks where the receiver’s location may change at any moment, there will be inherent errors in estimating the receiver’s location. The occurrence of errors in estimating the angle and distance between the legitimate receiver and the transmitter leads to a significant reduction in the system’s secrecy rate. In this article, a new solution is proposed to increase the robustness against errors in estimating the legitimate receiver’s location by an optimization process based on the minimum mean square error criterion. This solution leads to the improvement of the physical layer security by employing random frequency diverse array directional modulation in the presence of estimation errors. Simulation results indicate an enhancement in the secrecy rate performance of the physical layer in wireless networks.

在现代通信系统中,使用定向调制是保证物理层安全的重要而实用的解决方案之一。在这种方法中,消息信号由天线阵列调制,并沿特定方向向合法接收器发射,这样信号就会降级,并且无法被其他方向的窃听者正确接收。通过采用基于随机变频阵列的方向调制,合法接收机可以在包括角度和距离在内的二维空间中实现安全通信。基于随机变频阵列的定向调制的保密性能在很大程度上依赖于发射端关于接收机位置的可用信息。在无线蜂窝网络中,接收机的位置随时可能发生变化,在估计接收机位置时存在固有的误差。在估计合法接收端和发送端之间的角度和距离时出现错误,导致系统的保密率显著降低。本文提出了一种基于最小均方误差准则的优化方法来提高合法接收机位置估计的鲁棒性。该方案在存在估计误差的情况下采用随机变频阵列定向调制,提高了物理层的安全性。仿真结果表明,无线网络中物理层的保密率性能得到了提高。
{"title":"Robust physical layer security using frequency diverse array directional modulation","authors":"Mahdi Tayeb Masoud,&nbsp;Hossein Khaleghi Bizaki","doi":"10.1007/s12243-025-01067-3","DOIUrl":"10.1007/s12243-025-01067-3","url":null,"abstract":"<div><p>The use of directional modulation is one of the prominent and practical solutions for ensuring physical layer security in modern telecommunications systems. In this method, the message signal is modulated by an array of antennas and transmitted in a specific direction toward the legitimate receiver, in such a way that the signal is degraded and not receivable correctly by eavesdroppers in other directions. By employing directional modulation based on a random frequency diverse array, secure communication can be achieved in two-dimensional space, including angle and distance, for the legitimate receiver. The secrecy performance of directional modulation based on a random frequency diverse array is considerably dependent on the information available to the transmitter side about the receiver’s location. In wireless cellular networks where the receiver’s location may change at any moment, there will be inherent errors in estimating the receiver’s location. The occurrence of errors in estimating the angle and distance between the legitimate receiver and the transmitter leads to a significant reduction in the system’s secrecy rate. In this article, a new solution is proposed to increase the robustness against errors in estimating the legitimate receiver’s location by an optimization process based on the minimum mean square error criterion. This solution leads to the improvement of the physical layer security by employing random frequency diverse array directional modulation in the presence of estimation errors. Simulation results indicate an enhancement in the secrecy rate performance of the physical layer in wireless networks.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 7-8","pages":"699 - 710"},"PeriodicalIF":2.2,"publicationDate":"2025-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145165495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multimodal emotion recognition: integrating speech and text for improved valence, arousal, and dominance prediction 多模态情绪识别:整合语音和文本以改善效价、觉醒和优势预测
IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-02-12 DOI: 10.1007/s12243-025-01069-1
Messaoudi Awatef, Boughrara Hayet, Lachiri Zied

While speech emotion recognition has traditionally focused on classifying emotions into discrete categories like happy or angry, recent research has shifted towards a dimensional approach using the Valence-Arousal-Dominance model. This model captures the continuous emotional state. However, research in speech emotion recognition (SER) consistently shows lower performance in predicting valence compared to arousal and dominance. To improve performance, we propose a system that combines acoustic and linguistic information. This work explores a novel multimodal approach for emotion recognition that combines speech and text data. This fusion strategy aims to outperform the traditional single-modality systems. Both early and late fusion techniques are investigated in this paper. Our findings show that combining modalities in a late fusion approach enhances system performance. In this late fusion architecture, the outputs from the acoustic deep learning network and the linguistic network are fed into two stacked dense neural network (NN) layers to predict valence, arousal, and dominance as continuous values. This approach leads to a significant improvement in overall emotion recognition performance compared to prior methods.

虽然语音情感识别传统上专注于将情绪分为快乐或愤怒等离散类别,但最近的研究已经转向使用Valence-Arousal-Dominance模型的维度方法。这个模型捕捉了持续的情绪状态。然而,语音情绪识别(SER)的研究一直表明,与唤醒和支配相比,预测效价的效果较差。为了提高性能,我们提出了一个结合声学和语言信息的系统。这项工作探索了一种结合语音和文本数据的新的多模态情感识别方法。这种融合策略旨在超越传统的单模态系统。本文研究了早期和晚期融合技术。我们的研究结果表明,在后期融合方法中结合模式可以提高系统性能。在这种后期融合架构中,声学深度学习网络和语言网络的输出被输入到两个堆叠的密集神经网络(NN)层中,以连续值预测价态、唤醒和优势。与之前的方法相比,这种方法在整体情绪识别性能上有了显著的提高。
{"title":"Multimodal emotion recognition: integrating speech and text for improved valence, arousal, and dominance prediction","authors":"Messaoudi Awatef,&nbsp;Boughrara Hayet,&nbsp;Lachiri Zied","doi":"10.1007/s12243-025-01069-1","DOIUrl":"10.1007/s12243-025-01069-1","url":null,"abstract":"<div><p>While speech emotion recognition has traditionally focused on classifying emotions into discrete categories like happy or angry, recent research has shifted towards a dimensional approach using the Valence-Arousal-Dominance model. This model captures the continuous emotional state. However, research in speech emotion recognition (SER) consistently shows lower performance in predicting valence compared to arousal and dominance. To improve performance, we propose a system that combines acoustic and linguistic information. This work explores a novel multimodal approach for emotion recognition that combines speech and text data. This fusion strategy aims to outperform the traditional single-modality systems. Both early and late fusion techniques are investigated in this paper. Our findings show that combining modalities in a late fusion approach enhances system performance. In this late fusion architecture, the outputs from the acoustic deep learning network and the linguistic network are fed into two stacked dense neural network (NN) layers to predict valence, arousal, and dominance as continuous values. This approach leads to a significant improvement in overall emotion recognition performance compared to prior methods.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 and networking","pages":"401 - 415"},"PeriodicalIF":2.2,"publicationDate":"2025-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145164872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the interoperability of verifiable credentials: simple universal verifier (SUV) 可验证凭证的互操作性:简单通用验证器(SUV)
IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-02-06 DOI: 10.1007/s12243-025-01066-4
Mustafa Kaiiali, Ioram Schechtman Sette, Ahmad Samer Wazan, David W. Chadwick, Omar Alfandi

A digital identity is a digital representation of an individual’s identity. In the era of the Internet, it becomes increasingly important to adopt a digital identity format that is cryptographically secure and privacy-preserving. Indeed, a digital identity has the potential to offer better privacy protection than a physical identity document, where users are forced to disclose more information when presenting their identity documents than what is actually needed. Nevertheless, digital identities have not come without their own set of new challenges. One of the key issues to fully adopting digital identities is the lack of standards—both for the format of digital identities and the protocols for transferring them. This paper discusses the various formats and protocols currently used in the digital identity market. Then it introduces the Simple Universal Verifier (SUV) as an approach to tackle the current lack of interoperability for the verification phase. The SUV has been implemented and used to integrate a Relying Party (RP) with Microsoft and Identiproof Verifiable Credentials platforms and also integrates with the TRAIN trust management infrastructure.

数字身份是个人身份的数字表示。在互联网时代,采用加密安全和保护隐私的数字身份格式变得越来越重要。事实上,数字身份有可能提供比实体身份证件更好的隐私保护,在实体身份证件中,用户在出示身份证件时被迫披露比实际需要更多的信息。然而,数字身份的出现也带来了一系列新的挑战。全面采用数字身份的关键问题之一是缺乏标准——无论是数字身份的格式还是传输数字身份的协议。本文讨论了目前数字身份市场中使用的各种格式和协议。然后介绍了简单通用验证器(SUV)作为解决当前验证阶段缺乏互操作性的方法。该SUV已被实施并用于将依赖方(RP)与Microsoft和Identiproof Verifiable Credentials平台集成,并与TRAIN信任管理基础设施集成。
{"title":"On the interoperability of verifiable credentials: simple universal verifier (SUV)","authors":"Mustafa Kaiiali,&nbsp;Ioram Schechtman Sette,&nbsp;Ahmad Samer Wazan,&nbsp;David W. Chadwick,&nbsp;Omar Alfandi","doi":"10.1007/s12243-025-01066-4","DOIUrl":"10.1007/s12243-025-01066-4","url":null,"abstract":"<div><p>A digital identity is a digital representation of an individual’s identity. In the era of the Internet, it becomes increasingly important to adopt a digital identity format that is cryptographically secure and privacy-preserving. Indeed, a digital identity has the potential to offer better privacy protection than a physical identity document, where users are forced to disclose more information when presenting their identity documents than what is actually needed. Nevertheless, digital identities have not come without their own set of new challenges. One of the key issues to fully adopting digital identities is the lack of standards—both for the format of digital identities and the protocols for transferring them. This paper discusses the various formats and protocols currently used in the digital identity market. Then it introduces the Simple Universal Verifier (SUV) as an approach to tackle the current lack of interoperability for the verification phase. The SUV has been implemented and used to integrate a Relying Party (RP) with Microsoft and Identiproof Verifiable Credentials platforms and also integrates with the TRAIN trust management infrastructure.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 7-8","pages":"639 - 657"},"PeriodicalIF":2.2,"publicationDate":"2025-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145162779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing the physical layer security in IoT over mixed Rayleigh-Nakagami-m fading channels with untrustworthy relays 在具有不可信中继的混合瑞利-中川衰落信道上增强物联网中的物理层安全性
IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-01-11 DOI: 10.1007/s12243-025-01064-6
Parmila Devi, Manoranjan R. Bharti

The Internet of Things (IoT) enables 5G communication, and it is widely used in many industries owing to its ability to connect a massive number of devices, process data intelligently, and enable remote control. However, the open nature of wireless communications makes information security and privacy critical concerns. In this paper, we investigate the issue of physical layer security (PLS) within a two-hop wireless cooperative network, where communication is facilitated by an untrusted relay. This investigation was performed over mixed Rayleigh-Nakagami-(varvec{m}) fading channels in the presence of multiple non-colluding eavesdroppers. To improve the system’s security, we considered the incorporation of cooperative jamming and opportunistic relaying techniques. We formulated explicit equations for both the secrecy capacity and the secrecy outage probability within the system. Finally, by leveraging numerical results, simulations, and comparisons with existing works, we demonstrated the effectiveness of the proposed approach. This demonstration highlights that the suggested method serves as an effective method to enhance the security of IoT data collection processes, particularly in scenarios involving untrustworthy relays and highly risky eavesdropping threats.

物联网(IoT)使5G通信成为可能,由于能够连接大量设备,智能处理数据并实现远程控制,因此在许多行业中得到广泛应用。然而,无线通信的开放性使信息安全和隐私成为关键问题。在本文中,我们研究了两跳无线合作网络中的物理层安全(PLS)问题,其中通信由不可信中继促进。这项调查是在多个非串通窃听者存在的情况下,在混合瑞利-中川- (varvec{m})衰落信道上进行的。为了提高系统的安全性,我们考虑了联合干扰和机会中继技术。我们建立了系统内保密能力和保密中断概率的显式方程。最后,通过利用数值结果、模拟和与现有工作的比较,我们证明了所提出方法的有效性。该演示突出表明,所建议的方法是增强物联网数据收集过程安全性的有效方法,特别是在涉及不可信中继和高风险窃听威胁的场景中。
{"title":"Enhancing the physical layer security in IoT over mixed Rayleigh-Nakagami-m fading channels with untrustworthy relays","authors":"Parmila Devi,&nbsp;Manoranjan R. Bharti","doi":"10.1007/s12243-025-01064-6","DOIUrl":"10.1007/s12243-025-01064-6","url":null,"abstract":"<div><p>The Internet of Things (IoT) enables 5G communication, and it is widely used in many industries owing to its ability to connect a massive number of devices, process data intelligently, and enable remote control. However, the open nature of wireless communications makes information security and privacy critical concerns. In this paper, we investigate the issue of physical layer security (PLS) within a two-hop wireless cooperative network, where communication is facilitated by an untrusted relay. This investigation was performed over mixed Rayleigh-Nakagami-<span>(varvec{m})</span> fading channels in the presence of multiple non-colluding eavesdroppers. To improve the system’s security, we considered the incorporation of cooperative jamming and opportunistic relaying techniques. We formulated explicit equations for both the secrecy capacity and the secrecy outage probability within the system. Finally, by leveraging numerical results, simulations, and comparisons with existing works, we demonstrated the effectiveness of the proposed approach. This demonstration highlights that the suggested method serves as an effective method to enhance the security of IoT data collection processes, particularly in scenarios involving untrustworthy relays and highly risky eavesdropping threats.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 7-8","pages":"613 - 626"},"PeriodicalIF":2.2,"publicationDate":"2025-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145164829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CSNet 2023 special issue—the resilient networked systems CSNet 2023特刊-弹性网络系统
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-11-19 DOI: 10.1007/s12243-024-01063-z
Carol Fung, Augusto Neto, Nur Zincir-Heywood, Changqing Luo
{"title":"CSNet 2023 special issue—the resilient networked systems","authors":"Carol Fung,&nbsp;Augusto Neto,&nbsp;Nur Zincir-Heywood,&nbsp;Changqing Luo","doi":"10.1007/s12243-024-01063-z","DOIUrl":"10.1007/s12243-024-01063-z","url":null,"abstract":"","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 11-12","pages":"707 - 709"},"PeriodicalIF":1.8,"publicationDate":"2024-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142753948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Carbon footprint of cloud, edge, and Internet of Edges 云、边缘和边缘互联网的碳足迹
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-11-12 DOI: 10.1007/s12243-024-01061-1
Pauline Loygue, Khaldoun Al Agha, Guy Pujolle

In this article, we highlight the carbon footprint of data transport on Internet infrastructures by bringing together a series of studies that break down the carbon impact of digital technologies and detail the geography and routing of the Internet. The article also draws a comparison between three types of digital infrastructure where digital services are hosted either in the cloud, at the edge, or in an Internet of Edges. This comparison emphasizes the advantages of establishing shorter data routes to reduce the carbon footprint of digital communications.

在本文中,我们汇集了一系列研究,这些研究分解了数字技术的碳影响,并详细介绍了互联网的地理位置和路由,从而强调了互联网基础设施上数据传输的碳足迹。本文还对三种类型的数字基础设施进行了比较,其中数字服务托管在云中、边缘或边缘互联网中。这种比较强调了建立更短的数据路由以减少数字通信的碳足迹的优势。
{"title":"Carbon footprint of cloud, edge, and Internet of Edges","authors":"Pauline Loygue,&nbsp;Khaldoun Al Agha,&nbsp;Guy Pujolle","doi":"10.1007/s12243-024-01061-1","DOIUrl":"10.1007/s12243-024-01061-1","url":null,"abstract":"<div><p>In this article, we highlight the carbon footprint of data transport on Internet infrastructures by bringing together a series of studies that break down the carbon impact of digital technologies and detail the geography and routing of the Internet. The article also draws a comparison between three types of digital infrastructure where digital services are hosted either in the cloud, at the edge, or in an Internet of Edges. This comparison emphasizes the advantages of establishing shorter data routes to reduce the carbon footprint of digital communications.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 1-2","pages":"153 - 169"},"PeriodicalIF":1.8,"publicationDate":"2024-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143108578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new spatial modulation scheme exploiting linear frequency modulation 利用线性调频的一种新的空间调制方案
IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-11-04 DOI: 10.1007/s12243-024-01062-0
Chellali Slimani, Khalida Ghanem, Farid Ghanem, Mourad Nedil

In forthcoming 6 G wireless networks, spatial modulation (SM) has established itself as a technique in massive MIMO setups. In this letter, a novel SM architecture embedding linear frequency modulation (LFM) principle is proposed. In the resulting SM-LFM scheme, the data block is split into the signal and the antenna index parts, and prior to its transmission, distinctly assigns a different LFM chirp (up or down) to be mixed up with the SM block, depending on the index of the antenna to be activated. When the antenna index is even, the associated chirp is up, while the down chirp is retained otherwise. Similarly, the proposed SM-LFM receiver part consists of two main parts: the LFM chirp recognizer and the tuned SM detector. In the former, the received signal is fed to the two up and down LFM chirp-correlators, and the chirp selected at the transmitter is retrieved by an energy comparator. The target behind the incorporation of the LFM chirps, between each adjacent antennas-pair, is to mitigate the miss-estimation of the antenna indices at the receiver side. Depending upon the detected chirp, in the tuned SM detector, only the signals (indices and symbols) emanating from even- or odd-indexed antennas are processed. The performance of the resulting scheme is investigated by adopting a channel model, which considers the effects of estimation errors and antenna correlation. Two modified detectors which adapt to the LFM signaling are investigated, namely the iterative maximum ratio combining (i-MRC) and the maximum likelihood (ML) detectors. The improvement provided, by adopting LFM concept in SM, is shown in terms of data reliability and complexity reduction.

在即将到来的6g无线网络中,空间调制(SM)已经成为大规模MIMO设置中的一种技术。本文提出了一种嵌入线性调频(LFM)原理的新型SM结构。在由此产生的SM-LFM方案中,数据块被分成信号和天线索引部分,并且在其传输之前,根据要激活的天线索引,明确分配不同的LFM啁啾(向上或向下)与SM块混合。当天线指数为偶数时,相关的啁啾为上啁啾,反之则保留下啁啾。同样,本文提出的SM-LFM接收机部分由两个主要部分组成:LFM调频啁啾识别器和调谐的SM检测器。在前者中,接收到的信号被馈送到两个上下LFM啁啾相关器,并且在发射机中选择的啁啾由能量比较器检索。在每个相邻天线对之间合并LFM啁啾的目标是减轻接收端天线指标的误估计。根据检测到的啁啾,在调谐的SM检测器中,只处理偶数或奇数索引天线发出的信号(指数和符号)。采用信道模型,考虑了估计误差和天线相关性的影响,对方案的性能进行了研究。研究了两种适应LFM信号的改进检测器,即迭代最大比值组合检测器(i-MRC)和最大似然检测器(ML)。在SM中采用LFM概念所带来的改进体现在数据可靠性和降低复杂性方面。
{"title":"A new spatial modulation scheme exploiting linear frequency modulation","authors":"Chellali Slimani,&nbsp;Khalida Ghanem,&nbsp;Farid Ghanem,&nbsp;Mourad Nedil","doi":"10.1007/s12243-024-01062-0","DOIUrl":"10.1007/s12243-024-01062-0","url":null,"abstract":"<div><p>In forthcoming 6 G wireless networks, spatial modulation (SM) has established itself as a technique in massive MIMO setups. In this letter, a novel SM architecture embedding linear frequency modulation (LFM) principle is proposed. In the resulting SM-LFM scheme, the data block is split into the signal and the antenna index parts, and prior to its transmission, distinctly assigns a different LFM chirp (up or down) to be mixed up with the SM block, depending on the index of the antenna to be activated. When the antenna index is even, the associated chirp is up, while the down chirp is retained otherwise. Similarly, the proposed SM-LFM receiver part consists of two main parts: the LFM chirp recognizer and the tuned SM detector. In the former, the received signal is fed to the two up and down LFM chirp-correlators, and the chirp selected at the transmitter is retrieved by an energy comparator. The target behind the incorporation of the LFM chirps, between each adjacent antennas-pair, is to mitigate the miss-estimation of the antenna indices at the receiver side. Depending upon the detected chirp, in the tuned SM detector, only the signals (indices and symbols) emanating from even- or odd-indexed antennas are processed. The performance of the resulting scheme is investigated by adopting a channel model, which considers the effects of estimation errors and antenna correlation. Two modified detectors which adapt to the LFM signaling are investigated, namely the iterative maximum ratio combining (i-MRC) and the maximum likelihood (ML) detectors. The improvement provided, by adopting LFM concept in SM, is shown in terms of data reliability and complexity reduction.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 7-8","pages":"591 - 597"},"PeriodicalIF":2.2,"publicationDate":"2024-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145161838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial of 6GNet 2023 special issue 6GNet 2023 特刊编辑
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-10-23 DOI: 10.1007/s12243-024-01060-2
Raouf Boutaba, Guy Pujolle, Amina Boudendir, Abdallah Shami, Daniel Benevides da Costa
{"title":"Editorial of 6GNet 2023 special issue","authors":"Raouf Boutaba,&nbsp;Guy Pujolle,&nbsp;Amina Boudendir,&nbsp;Abdallah Shami,&nbsp;Daniel Benevides da Costa","doi":"10.1007/s12243-024-01060-2","DOIUrl":"10.1007/s12243-024-01060-2","url":null,"abstract":"","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 9-10","pages":"603 - 604"},"PeriodicalIF":1.8,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142524498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Annals of Telecommunications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1